Platform Completes Migration to Tor v3 Exclusively

Published: Oct 21, 2025

Tor v3 migration onion service complete

The platform completed its full migration to Tor v3 onion services on October 21, 2025, officially retiring all remaining legacy v2 onion addresses. Tor v2 addresses had been deprecated by the Tor Project itself, and the platform had been running parallel v2 and v3 addresses for compatibility during a transition period. The v3 migration provides several concrete security improvements. V3 onion addresses are 56 characters long and use a cryptographic derivation that encodes the public key of the hidden service directly into the address � meaning the address itself cryptographically authenticates the service. Connecting to a correct v3 address guarantees you are connecting to the server that controls the corresponding private key. This property is fundamental to phishing protection: while a phishing site can mimic the visual design, it cannot possess a valid private key for an address it does not control. V3 also uses a better descriptor encryption scheme that provides stronger protection against directed traffic analysis and improved resistance to guard relay attacks compared to the legacy v2 protocol. Users who had bookmarked v2 addresses received a migration notice on the platform, directing them to update their bookmarks. The v2 addresses officially stopped resolving on October 21, 2025, following a 60-day dual-stack operation period.

Read more on our News Index. Access verified links at Enter Marketplace.